YoVDO

Over-The-Top Bypass - Study of a Recent Telephony Fraud

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Fraud Prevention Courses Telecommunications Security Courses

Course Description

Overview

Explore a comprehensive analysis of a recent telephony fraud known as Over-The-Top Bypass in this 28-minute conference talk presented at the 23rd ACM Conference on Computer and Communications Security (CCS 2016). Delve into the research conducted by Merve Sahin and Aurélien Francillon from Eurecom as they examine the intricacies of this emerging threat to telecommunications security. Gain insights into the mechanisms, implications, and potential countermeasures for this fraudulent activity that exploits vulnerabilities in modern communication systems. Learn how this bypass technique impacts both service providers and end-users, and understand the challenges it poses to the integrity of telephony networks. Discover the latest findings in this cutting-edge study, presented at the prestigious conference held at Hofburg Palace in Vienna, Austria, organized by SBA Research.

Syllabus

CCS 2016 - Over-The-Top Bypass: Study of a Recent Telephony Fraud


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube